CAPEC-149: Explore for Predictable Temporary File Names |
Description An attacker explores a target to identify the names and locations of predictable temporary files for the purpose of launching further attacks against the target. This involves analyzing naming conventions and storage locations of the temporary files created by a target application. If an attacker can predict the names of temporary files they can use this information to mount other attacks, such as information gathering and symlink attacks. Typical Severity Prerequisites
| The targeted application must create names for temporary files using a predictable procedure, e.g. using sequentially increasing numbers. |
| The attacker must be able to see the names of the files the target is creating. |
Resources Required
| None: No specialized resources are required to execute this type of attack. |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (see
parent
) Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-01-09 (Version 2.9) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Prerequisites, Resources_Required | | 2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2023-01-24 (Version 3.9) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Weaknesses |
More information is available — Please select a different filter.
|